A guide to kernel exploitation attacking the core
The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical tech...
Main Author: | |
---|---|
Other Authors: | , |
Format: | eBook |
Language: | Inglés |
Published: |
Burlington, MA :
Syngress
c2010.
|
Edition: | 1st edition |
Subjects: | |
See on Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628271106719 |
Table of Contents:
- CONTENTS; Foreword; Preface; Acknowledgments; About the Authors; About the Technical Editor; PART I: A JOURNEY TO KERNEL LAND; CHAPTER 1 From User-Land to Kernel-Land Attacks; CHAPTER 2 A Taxonomy of Kernel Vulnerabilities; CHAPTER 3 Stairway to Successful Kernel Exploitation; PART II: THE UNIX FAMILY, MAC OS X, AND WINDOWS; CHAPTER 4 The UNIX Family; CHAPTER 5 Mac OS X; CHAPTER 6 Windows; PART III: REMOTE KERNEL EXPLOITATION; CHAPTER 7 Facing the Challenges of RemoteKernel Exploitation; CHAPTER 8 Putting It All Together: A Linux Case Study; PART IV: FINAL WORDS
- CHAPTER 9 Kernel Evolution: Future Forms of Attackand DefenseIndex